Open Trusted Technology Provider™ Standard (O-TTPS) Assessment Procedures Version 1.0 January 2014 © Copyright 2013-2014, The Open Group All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior permission of the copyright owner. ArchiMate®, DirecNet®, Jericho Forum®, Making Standards Work®, OpenPegasus®, The Open Group®, TOGAF®, and UNIX® are registered trademarks and Boundaryless Information Flow™, Build with Integrity Buy with Confidence™, Dependability Through Assuredness™, FACE™, Open Platform 3.0™, Open Trusted Technology Provider™, and The Open Group Certification Mark™ are trademarks of The Open Group. All other brands, company, and product names are used for identification purposes only and may be trademarks that are the sole property of their respective owners. Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures This update contains changes to The Open Group trademarks only. Published by The Open Group, January 2014. Comments relating to the material contained in this document may be submitted to: The Open Group, 8 New England Executive Park, Burlington, MA 01803, United States or by electronic mail to: [email protected] Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 2 Contents 1. 2. A B C Introduction ........................................................................................................................................................ 4 1.1 Terminology .......................................................................................................................................... 4 1.2 Referenced Documents .......................................................................................................................... 4 O-TTPS Assessment ........................................................................................................................................... 5 2.1 Preparation for Accreditation ................................................................................................................ 7 2.2 Registering for Accreditation ................................................................................................................ 7 2.3 Completing the Conformance Statement Questionnaire ....................................................................... 7 2.4 Completing the ISCA Document .......................................................................................................... 7 2.5 Accreditation Authority Reviews and Approves the Conformance Statement and ISCA Document .. 8 2.6 Organization Selects an O-TTPS Recognized Assessor ....................................................................... 8 2.7 Organization Prepares Accreditation Package ...................................................................................... 8 2.8 Assessor Performs the Assessment ....................................................................................................... 8 2.9 Assessor Recommends Accreditation ................................................................................................... 9 2.10 Accreditation Authority Reviews the Accreditation Package Document ............................................. 9 2.11 Organization Signs Trademark License Agreement ............................................................................. 9 2.12 Accreditation Awarded .......................................................................................................................... 9 2.13 Withdrawal from the Accreditation Process ....................................................................................... 10 Assessment Guidelines ..................................................................................................................................... 11 A.1 General Guidance for Assessor Activities........................................................................................... 11 A.2 Audit Reports ...................................................................................................................................... 12 Assessor Activities for O-TTPS Requirements ................................................................................................ 13 B.1 PD_DES: Software/Firmware/Hardware Design Process ................................................................... 14 B.2 PD_CFM: Configuration Management ............................................................................................... 15 B.3 PD_MPP: Well-defined Development/Engineering Method Process and Practices ........................... 17 B.4 PD_QAT: Quality and Test Management ........................................................................................... 18 B.5 PD_PSM: Product Sustainment Management ..................................................................................... 20 B.6 SE_TAM: Threat Analysis and Mitigation ......................................................................................... 22 B.7 SE_VAR: Vulnerability Analysis and Response ................................................................................ 24 B.8 SE_PPR: Product Patching and Remediation ..................................................................................... 25 B.9 SE_SEP: Secure Engineering Practices .............................................................................................. 26 B.10 SE_MTL: Monitor and Assess the Impact of Changes in the Threat Landscape ............................... 28 B.11 SC_RSM: Risk Management .............................................................................................................. 29 B.12 SC_PHS: Physical Security ................................................................................................................. 31 B.13 SC_ACC: Access Controls .................................................................................................................. 32 B.14 SC_ESS: Employee and Supplier Security and Integrity .................................................................... 34 B.15 SC_BPS: Business Partner Security .................................................................................................... 35 B.16 SC_STR: Supply Chain Security Training .......................................................................................... 36 B.17 SC_ISS: Information Systems Security .............................................................................................. 37 B.18 SC_TTC: Trusted Technology Components ....................................................................................... 38 B.19 SC_STH: Secure Transmission and Handling .................................................................................... 39 B.20 SC_OSH: Open Source Handling ....................................................................................................... 41 B.21 SC_CTM: Counterfeit Mitigation ....................................................................................................... 43 B.22 SC_MAL: Malware Detection ............................................................................................................ 44 Recording Assessment Findings ....................................................................................................................... 45 C.1 Recording Final Observations ............................................................................................................. 45 C.2 Determining the Assessment Outcome ............................................................................................... 46 C.3 Completing the Assessment Report .................................................................................................... 46 Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 3 1. Introduction This document defines the procedures utilized by an Assessor when conducting an O-TTPS Assessment. The primary audience for this document is the Assessor; however, an Organization that is undergoing Assessment and needs to understand the requirements for accreditation in more depth may also find this document useful. 1.1 Terminology Refer to the Terminology section in the O-TTPS Accreditation Policy. 1.2 Referenced Documents The following documents are referenced within this document: • Accreditation Requirements • Accreditation Package Document • Accreditation Policy • Implementation Selection Criteria Application (ISCA) Document Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 4 2. O-TTPS Assessment Figure 1 defines the symbols and colors that are used in the workflow diagrams and applies to all figures within this document. Symbol Function The start or end of the process. Color Resource Blue Organization A process, task, or action. Green Accreditation Authority A decision. The answer or response determines the path to be taken. Yellow Assessor The direction of the process flow. Orange Document or other input or output Inputs or outputs. Dark Blue Purple Problem Report Submitter Specification Authority Figure 1: Accreditation Workflow Legend Figure 2 captures the procedures utilized by an Assessor when conducting an O-TTPS Assessment. Its steps are described further in this section. Assessors please note that all of the steps in the flowchart are included for informational purposes and they align with those described in the O-TTPS Accreditation Policy. The Assessor’s involvement is primarily with those activities described in steps 2.6 – 2.10. The activities expected of Assessors and the guidelines for executing those activities are further described in Appendix A and B. Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 5 Start O-TTPS (Standard) Assessment Procedures Organization identifies O-TTPS Processes 2.1 Organization becomes familiar with the O-TTPS Accreditation Program requirements 2.2 Accreditation Program Guide Accreditation Policy Accreditation Requirements Signed Accreditation Agreement Accreditation Fees Accreditation Fee Schedule Conformance Statement Questionnaire Organization registers for accreditation with Accreditation Authority 2.3- 2.4 Organization completes ISCA Document and Conformance Statement Questionnaire Conformance Statement No 2.5 2.6 AA approves Yes Scope and Selected Representative Products? Assessment Procedures Assessor performs Assessment 2.9 Organization prepares Accreditation Package Organization has additional evidence to provide? No AA reviews Accreditation Package Document Organization wishes to withdraw? Success Yes 2.13 AA checks Trademark License Agreement signed? No No Organization withdraws from the accreditation process Organization revises Scope of Accreditation End Re-enter at step 2.3 2.11 Yes Yes No Yes 2.10 Trademark License Agreement 2.7 Evidence of Conformance Assessor recommends accreditation? Accreditation Package Document template Organization selects an O-TTPS Recognized Assessor Accreditation Package Document 2.8 Clarification or rework needed Register of O-TTPS Recognized Assessors ISCA Document Organization signs Trademark License Agreement 2.12 AA accredits as per scope on the Conformance Statement End Accreditation Certificate Accreditation Logo Accreditation Register Entry Figure 2: Assessment Procedures Workflow Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 6 2.1 Preparation for Accreditation Prior to registering for accreditation, with a goal of ensuring that it is ready for entry into the O-TTPS Accreditation Program, the Organization should become familiar with the Referenced and any other informative documents, such as FAQs. Once an Organization believes it is in conformance with the Accreditation Requirements for the defined Scope of Accreditation, the Organization may register for accreditation. 2.2 Registering for Accreditation The first step in the process is for the Organization to register its intent to be accredited by completing the registration information and submitting it along with the Accreditation Agreement and accreditation fee to the Accreditation Authority. As part of the registration process, the Organization must specify the Organization's Accreditation Contacts. All notifications regarding this accreditation and any subsequent renewals will be sent by the Accreditation Authority to the Accreditation Contacts. It is the responsibility of the Organization to ensure that these Accreditation Contacts are kept up-to-date for the duration of the accreditation. 2.3 Completing the Conformance Statement Questionnaire The Organization must produce a Conformance Statement using the Conformance Statement Questionnaire. The Conformance Statement defines: • The legal entity applying for accreditation • The Scope of Accreditation for the proposed accreditation • Optionally, any defined exclusions (e.g., products, product lines, geographies, etc.) that the Organization would like explicitly listed as outside the Scope of Accreditation The O-TTPS Accreditation Program allows the Organization to choose its Scope of Accreditation. For example, an Organization may accredit one or more individual products, by business unit, or enterprisewide. 2.4 Completing the ISCA Document The Organization must complete the ISCA Document per the instructions within the document to the satisfaction of the Accreditation Authority. The objective of this activity is to identify a subset of products within the Scope of Accreditation that is representative of the Scope of Accreditation. All Selected Representative Products will be assessed for conformance to the Accreditation Requirements. The ISCA Document also contains a description of the methodology and rationale used to apply the Implementation Selection Criteria in the selection and any other information that the Organization may want to disclose to the Accreditation Authority to justify its Selected Representative Products. Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 7 2.5 Accreditation Authority Reviews and Approves the Conformance Statement and ISCA Document The Accreditation Authority will review the Conformance Statement and the ISCA Document. Since there may be considerable variation between applications for accreditation in both the Scope of Accreditation and the Selected Representative Products, the Accreditation Authority will also review these documents for consistency across other O-TTPS accreditation applications and for appropriate selection of products. The Accreditation Authority will keep confidential and not share with the Assessor information related to how the Organization applies the Implementation Selection Criteria and the methodology and rationale used to choose the Selected Representative Products. The Accreditation Authority must approve both the Conformance Statement, which includes the Scope of Accreditation, and the ISCA Document, which includes the Selected Representative Products, before the Organization can move forward in the Assessment process. The Accreditation Authority will respond to the Organization within 20 days to provide approval or an explanation of any elements that need further clarification or revision in the Conformance Statement or the ISCA Document. 2.6 Organization Selects an O-TTPS Recognized Assessor The Organization chooses an O-TTPS Recognized Assessor from the register of O-TTPS Recognized Assessors to perform its Assessment. This register will be maintained on the Accreditation Authority’s website. To be recognized by The Open Group as an O-TTPS Recognized Assessor, a company must meet the criteria defined in the O-TTPS Recognized Assessor Agreement. The company must also enter into the O-TTPS Recognized Assessor Agreement with the Accreditation Authority. The rationale and process for removing an O-TTPS Recognized Assessor from the register of O-TTPS Recognized Assessors is defined in the O-TTPS Recognized Assessor Agreement. The Organization informs the Accreditation Authority which O-TTPS Recognized Assessor has been engaged. Should the Organization subsequently change its choice of O-TTPS Recognized Assessor, the Organization must notify the Accreditation Authority. 2.7 Organization Prepares Accreditation Package After the Accreditation Authority approves the Selected Representative Products, the Organization assembles the Accreditation Package, which consists of the Accreditation Package Document and the Evidence of Conformance. The Accreditation Package Document contains a table for each requirement in which the Organization must supply pointers to evidence that demonstrates conformance to that requirement for every Selected Representative Product. The Evidence of Conformance is all material referenced in the Accreditation Package Document and necessary to demonstrate conformance to the Accreditation Requirements. The Organization submits the Accreditation Package to the Assessor. 2.8 Assessor Performs the Assessment The Assessor assesses the Accreditation Package Document and the Evidence of Conformance it references. Applying these Assessment Procedures, the Assessor determines whether the evidence Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 8 provided demonstrates the Organization's conformity to the Accreditation Requirements for each of the Selected Representative Products. The Assessor records comments regarding conformance to the Accreditation Requirements in the Accreditation Package Document according to the instructions in these Assessment Procedures. 2.9 Assessor Recommends Accreditation Once the Assessor has completed the Assessment Report and is able to recommend accreditation, both the Organization and the Assessor review and sign the Assessment Report. The Assessor submits the updated Accreditation Package Document, including the Assessment Report, to the Accreditation Authority. This fully complete Accreditation Package Document forms the Accreditation Authority’s record of the Assessment. The Evidence of Conformance that was submitted to the Assessor remains with the Assessor and must be archived for a period of at least six (6) years. 2.10 Accreditation Authority Reviews the Accreditation Package Document The Accreditation Authority reviews the completed Accreditation Package Document for consistency and completeness and to determine whether: • The Accreditation Package Document is complete. • The Assessment Report is unambiguous. • The content and style are consistent with the Accreditation Package Documents from other O-TTPS accreditation applications. If the Accreditation Authority believes the Assessor's findings are insufficient, then the Accreditation Authority may require the Assessor to provide clarification or additional rationale to support the findings. 2.11 Organization Signs Trademark License Agreement If the Organization has not previously completed a Trademark License Agreement for use of the Accreditation Logo, it must be completed at this stage. The Accreditation Authority’s website contains information on how to obtain and complete the Trademark License Agreement. 2.12 Accreditation Awarded The Accreditation Authority will notify the Organization in writing of the outcome of the accreditation process. If the result is success and there is a Trademark License Agreement in place, the Accreditation Authority will accredit the Organization. Organizations have the option to delay listing their accreditation in the Accreditation Register as described in Section 11.3. At the time of achieving accreditation, or of agreeing to publicly list if previously delayed, the Accreditation Authority will issue an Accreditation Certificate, and enter the Organization’s details into the Accreditation Register. The Organization will also be notified that the Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 9 Accreditation Logo may then be used according to the terms defined in the Trademark License Agreement. 2.13 Withdrawal from the Accreditation Process If an Organization decides to withdraw from the accreditation process, it must provide notification to the Accreditation Authority that it is withdrawing; it is not required to provide a reason for withdrawal. In the case of withdrawal, the Assessor is not required to provide the Accreditation Package Document to the Accreditation Authority. When informed of a withdrawal by the Organization, the Accreditation Authority will archive the information that has thus far been provided to the Accreditation Authority. Any fees paid to the Accreditation Authority will be forfeited. The Organization may re-apply for accreditation at a later date though that application will be treated as a new application and, as such, will require payment of the applicable accreditation fee for submission of a full set of documents, and a full Assessment, as per an initial accreditation. As an alternative to withdrawal, the Organization may submit a revised Scope of Accreditation to the Accreditation Authority for approval. Effectively this means restarting the Assessment process with a revised Conformance Statement and ISCA Document, and if they are approved by the Accreditation Authority, then submitting a revised Accreditation Package. However, this differs from a re-application in that some of the results of the previous Assessment may be re-used where appropriate. Only one such revision of scope is permitted and a further revision would require a new application. Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 10 A Assessment Guidelines The activities expected of Assessors are described in this appendix. This appendix contains general guidelines for the Assessor that should be read, understood, and followed during an Assessment. Appendix B contains additional specific guidelines for the Assessor, arranged in table format with specific guidelines for assessing each of the O-TTPS Requirements. A.1 General Guidance for Assessor Activities This section contains general guidance for all Assessor activities. In Appendix B there is specific guidance associated with each requirement. General Requirements for Evidence of Conformance The Evidence of Conformance, demonstrating the existence of a process and the implementation of a process provided by the Organization, shall meet the following requirements: 1. There are two categories of evidence required: process and implementation. For process evidence, the types of evidence/artifacts listed in this document and in the ISCA Document, Appendix B are required. This is because these types are generally cited as being required in the O-TTPS and therefore are considered to be paramount in demonstrating conformance and will help assure consistency across all accreditation applications. For implementation evidence – that is, evidence that shows the process has been applied to the Selected Representative Products – the types of evidence/artifacts listed in this document are suggested/recommended types of evidence. This is because each Organization will likely have different ways of demonstrating implementation of the processes, which may include a wide variety of types of evidence. 2. The implementation evidence shall be related to the Selected Representative Products. 3. The implementation and process evidence provided must be sufficient to demonstrate conformance to the requirement. 4. The evidence provided should cover the period of time for which the claimed process has been implemented for the Selected Representative Product. 5. There may be one or more processes identified for each attribute; this will be evident from the Attribute to Process Mapping tables in the Accreditation Package Document. Therefore, in some cases it is acceptable for a requirement to be met by evidence from more than one formal process. 6. Evidence specified in the tables within this document indicates the expectations of content. The specific names of items and the location of information and document names used within the supplied Evidence of Conformance may vary and is acceptable so long as conformance to the requirement is shown. 7. Terminology used in identifying Evidence of Conformance by Organizations may differ from that used by the O-TTPS provided that the terms are understood by the Organization and the Assessor. 8. For some requirements, there are specific guidelines included in Appendix B. This guidance is there to aid the Assessor. Since some of the specific guidelines may be non-normative as they Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 11 relate to the requirement, failure to provide evidence to meet the specific guidance is not necessarily a non-conformance if appropriate alternate evidence is provided. However, the Assessor should consider whether the evidence provided is sufficient and, if not, then a nonconformance may be appropriate. As a minimum, the Assessor should note an observation that the guidance was not followed. 9. For those O-TTPS Requirements related to training programs, the purpose of receiving the training artifacts evidence is to ensure that the training occurs, not to judge the effectiveness of the training. 10. The term “routinely” is used occasionally in the O-TTPS. For Assessment purposes you should check that the period is defined. However, the Organization should provide a rationale for the stated period. 11. When photographic or video evidence is provided as Evidence of Conformance, it should be current and be indicative of how an Organization is currently applying its processes. 12. There are many security mechanisms that could be used and referenced in the Evidence of Conformance; e.g., digital signatures, encryption, hashing, and bound mechanisms. The mechanism employed by the Organization should be related to the risk analysis of the medium and environment in which the release is made. 13. The Assessor must maintain a log of their activities, which will be made available to the Accreditation Authority upon request, such that the Assessment is able to be repeated. The log should contain supplementary information about the Assessment Methodology used for each requirement, such as: who was interviewed (names and roles), on what topic, what evidence was reviewed, evidence identifier as indicated in the evidence tables, date, and location of the interview, whether the location was physical or virtual. A.2 Audit Reports Internal audit or assessment reports are acceptable types of evidence for all requirements, even if this is not explicitly stated in the evidence section of the Evidence of Conformance table. However, Assessors must be satisfied that the audit results are comprehensive (they cover all of the O-TTPS attributes) and complete, and that identified corrective actions have been cleared in a timely fashion. A small number of spot checks – for example, 10% of the requirements – are the minimum required for initial Assessment to verify the efficiency of an internal audit program. In all cases, when an audit report is submitted as Evidence of Conformance the Assessor shall ensure that: • The audits were performed by an auditor that is independent from the process being assessed. • The scope of the audit includes the processes and implementation evidence associated with the Selected Representative Products. • The audit reports address relevant O-TTPS Requirements and attributes. • The Selected Representative Products are included in the scope of the audits. • The audit was performed within 12 months prior to this Assessment. The audit report indicates that the requirements are met successfully or that any identified corrective actions have been addressed (i.e., have been cleared or in the process of being cleared). Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 12 B Assessor Activities for O-TTPS Requirements This appendix provides specific Assessor activities for each O-TTPS Requirement. The tables in this appendix are arranged as follows: • There is an overall heading for each attribute, which includes the name and acronym for the attribute, the definition of the attribute, and a reference to where in the O-TTPS the attribute and associated requirements can be found. • Under each attribute heading there are tables for every O-TTPS Requirement associated with that attribute. Each table contains the acronym for the O-TTPS Requirement, along with the exact wording of the O-TTPS Requirement. Each table also includes the following fields: • Assessment Type: Indicates whether the Evidence of Conformance to be provided/assessed is Process Evidence, Implementation Evidence, or both. • Related Requirements: Indicates which other O-TTPS Requirements should be considered in the Assessment of this requirement. • Specific Guidelines for Assessor Activities: Provides additional guidance for the specific requirement – if any. • Evidence of Conformance (Process): Indicates the types of process evidence that must be provided for each requirement. • Evidence of Conformance (Implementation): Indicates the types of implementation evidence that are suggested/recommended. Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 13 B.1 PD_DES: Software/Firmware/Hardware Design Process Attribute Definition A formal process exists that defines and documents how the requirements are translated into a product design. O-TTPS Reference Section 4.1.1.1. Assessor Activity Tables PD_DES.01 A process shall exist that assures the requirements are addressed in the design. Assessment Type Process and Implementation Related Requirements SC_TAM.02 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Product Requirements Management Process Product Design Process Evidence of Conformance (Implementation) Design artifacts, requirements traceability report, quality assurance, audit reports PD_DES.02 Product requirements shall be documented. Assessment Type Implementation Related Requirements SC_OSH.02 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Product requirements document Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 14 B.2 PD_CFM: Configuration Management Attribute Definition A formal process and supporting systems exist which assure the proper management, control, and tracking of change to product development and manufacturing assets and artifacts. O-TTPS Reference Section 4.1.1.2. Assessor Activity Tables PD_CFM.01 A documented formal process shall exist which defines the configuration management process and practices. Assessment Type Process and Implementation Related Requirements None. Specific Guidelines for Assessor Activities The configuration management process should include change management or separate process documentation should exist that covers change management. Evidence of Conformance (Process) Configuration Management Process Evidence of Conformance (Implementation) CM reports, build reports, CM tooling, CM artifacts, CM applications, tools, build tools, change control applications PD_CFM.02 Baselines of identified assets and artifacts under configuration management shall be established. Assessment Type Implementation Related Requirements CD_MPP.02 Specific Guidelines for Assessor Activities Baselines should be current and include the artifacts that constitute each product. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Product baselines in the CM system PD_CFM.03 Changes to identified assets and artifacts under configuration management shall be tracked and controlled. Assessment Type Process and Implementation Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 15 Related Requirements SC_OSH.03 Specific Guidelines for Assessor Activities Starting with a change request to the Selected Representative Product(s) trace that the process for change management process has been implemented. Evidence of Conformance (Process) Change Management Process Evidence of Conformance (Implementation) Problem reports, change reviews, build reports, requests for changes, build/scope review PD_CFM.05 Access to identified assets and artifacts and supporting systems shall be protected and secured. Assessment Type Process and Implementation Related Requirements SC_ACC.all Specific Guidelines for Assessor Activities An access control policy should exist and it should describe the access control policy for each of the artifacts and assets identified in the assessment of PD_CFM.02 and supporting systems. This includes physical access control policies and logical access control policies. The Assessor shall check that the evidence demonstrates that the access control policy has been implemented. Evidence of Conformance (Process) Security Controls: Access Control Policies & Procedures Evidence of Conformance (Implementation) Security audit reports, CM access control, problem tracking access control, build management access control, access controls to physical artifacts, role-based or identity-based access controls, list of supporting systems PD_CFM.06 A formal process shall exist that establishes acceptance criteria for work products accepted into the product baseline. Assessment Type Process and Implementation Related Requirements PD_QAT.all Specific Guidelines for Assessor Activities The acceptance criteria for each artifact and asset (configuration item) that forms part of the baseline should be defined. NOTE: Types of artifacts and assets may include, but are not limited to: source code, open source code, binary code, components, sub-assemblies, drivers, and documentation such as product manuals and configuration guides. Evidence of Conformance (Process) Product Development Process Evidence of Conformance (Implementation) Signed or acknowledged acceptance and compliance records, reports or output from the process gate reviews, business process flows Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 16 B.3 PD_MPP: Well-defined Development/Engineering Method Process and Practices Attribute Definition Development/engineering processes and practices are documented, and managed and followed across the life cycle. O-TTPS Reference Section 4.1.1.3. Assessor Activity Tables PD_MPP.02 The development/engineering process shall be able to track, as appropriate, components that are proven to be targets of tainting or counterfeiting as they progress through the life cycle. Assessment Type Process and Implementation Related Requirements PD_CFM.03, SC_MAL.01 Specific Guidelines for Assessor Activities The process should cover identifying and labeling components that are judged by the Organization as requiring tracking throughout the development/engineering life cycle. Evidence of Conformance (Process) Product Development Process Evidence of Conformance (Implementation) List of components that have been identified as requiring tracking targets of tainting/counterfeiting, CM tool Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 17 B.4 PD_QAT: Quality and Test Management Attribute Definition Quality and test management is practiced as part of the product development/engineering life cycle. O-TTPS Reference Section 4.1.1.4. Assessor Activity Tables PD_QAT.01 There shall be a quality and test product plan that includes quality metrics and acceptance criteria. Assessment Type Implementation Related Requirements PD_MPP.02, SC_TTC.01 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Quality Assurance Process, Product Test Process Evidence of Conformance (Implementation) Quality and test product plan, documented acceptance criteria PD_QAT.02 Testing and quality assessment activities shall be conducted according to the plan. Assessment Type Implementation Related Requirements SE_TAM.03, SC_TTC.01 Specific Guidelines for Assessor Activities The Assessor reviews the Evidence of Conformance related to QA of the work products under development. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Test reports which address the acceptance criteria, QA audit report, QA tracking, QA and test plan PD_QAT.03 Products or components shall meet appropriate quality criteria throughout the life cycle. Assessment Type Implementation Related Requirements PD_CFM.06, SC_TTC.01 Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 18 Specific Guidelines for Assessor Activities Note that “full life cycle” should be interpreted as throughout the development/engineering life cycle. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Test reports, QA audit report, QA tracking, QA plan Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 19 B.5 PD_PSM: Product Sustainment Management Attribute Definition Product support, release maintenance, and defect management are product sustainment services offered to acquirers while the product is generally available. These services can be provided free or for a fee. O-TTPS Reference Section 4.1.1.5. Assessor Activity Tables PD_PSM.01 A release maintenance process shall be implemented. Assessment Type Process and Implementation Related Requirements PD_QAT.03, PD_CFM.03, SC_MAL.02 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Product Release Maintenance Process Evidence of Conformance (Implementation) Design change requests, product update descriptions, defect reports PD_PSM.02 Release maintenance shall include a process for notification to acquirers of product updates. Assessment Type Process and Implementation Related Requirements SC_BPS.01 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Product Release Maintenance Process Evidence of Conformance (Implementation) Acquirer notification example PD_PSM.03 Release maintenance shall include a product update process, which uses security mechanisms. Assessment Type Process and Implementation Related Requirements SC_RSM.all, SC_STH.all Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 20 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Product Defect Management Process Evidence of Conformance (Implementation) Security audit report that covers updates, representative updates showing the Organization’s security mechanisms being used PD_PSM.04 A defect management process shall be implemented. Assessment Type Process and Implementation Related Requirements None. Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Product Defect Management Process Evidence of Conformance (Implementation) Evidence of a defect management process, defect reports PD_PSM.05 The defect management process shall include: a documented feedback and problem reporting process. Assessment Type Process and Implementation Related Requirements PD_MPT.02, SC_RSM.all, PD_DES.01 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Problem Reporting Process, Product Defect Management Process Evidence of Conformance (Implementation) Product failure reports, problem reports, change requests, product QA reports Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 21 B.6 SE_TAM: Threat Analysis and Mitigation Attribute Definition Threat analysis and mitigation identify a set of potential attacks on a particular product or system and describe how those attacks might be perpetrated and the best methods of preventing or mitigating potential attacks. O-TTPS Reference Section 4.1.2.1. Assessor Activity Tables SE_TAM.01 Product architecture and design shall be assessed against potential attacks to gain an understanding of the threat landscape. Assessment Type Process and Implementation Related Requirements SC_RSM.all, PD_DES.all Specific Guidelines for Assessor Activities The Assessor need not assess the Organization’s understanding of the relevant threat landscapes, even though a basic understanding of the threat landscape is a pre-requisite to such an analysis. However, it should be noted that the understanding of the threat landscape would usually be better understood as a result of this activity. Evidence of Conformance (Process) Product Design Process Evidence of Conformance (Implementation) A list of known potential attacks, threat assessment against product architecture and design, vulnerability analysis during all phases, relevant threat analysis reports SE_TAM.02 Threat mitigation strategies for tainted and counterfeit products shall be implemented as part of product development. Assessment Type Process and Implementation Related Requirements PD_DES.01 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Product Development Process Evidence of Conformance (Implementation) Process and method artifacts Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 22 SE_TAM.03 Threat analysis shall be used as input to the creation of test plans and cases. Assessment Type Process Related Requirements PD_QAT.02 Specific Guidelines for Assessor Activities The Assessor may choose to consider how threat analysis, from SE_TAM.01, is used as input to the creation of test plans and cases during the analysis of PD_QAT.01. Evidence of Conformance (Process) Product Test Process Evidence of Conformance (Implementation) None. Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 23 B.7 SE_VAR: Vulnerability Analysis and Response Attribute Definition Vulnerability analysis is the process of determining whether a product contains vulnerabilities and categorizing their potential severity. O-TTPS Reference Section 4.1.2.3. Assessor Activity Tables SE_VAR.01 Techniques and practices for vulnerability analysis shall be utilized. Some techniques include: code review, static analysis, penetration testing, white/black box testing, etc. Assessment Type Process and Implementation Related Requirements SE_TAM.01, SE_PPR.03 Specific Guidelines for Assessor Activities According to the attribute, the definition of vulnerability analysis is the process of determining whether a product contains vulnerabilities and categorizing their potential severity; therefore, the potential severity of vulnerabilities should be categorized. Evidence of Conformance (Process) Vulnerability: Analysis Process Evidence of Conformance (Implementation) Attacks, identified in SE_TAM.01, must be reflected in the vulnerability analysis, using, for example, the following: code scanning reports, build reports, code review documentation, penetration testing reports, test results SE_VAR.03 A process shall exist for governing notification of newly discovered and exploitable product vulnerabilities. Assessment Type Process and Implementation Related Requirements SC_BPS.01 Specific Guidelines for Assessor Activities The governing process should include a description of who should be notified. Evidence of Conformance (Process) Vulnerability: Analysis Process Evidence of Conformance (Implementation) List of newly discovered exploitable product vulnerabilities and evidence of the appropriate distribution; some examples are: Product Security Incident Response Team (PSIRT) process documentation, PSIRT reports, email records of notifications Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 24 B.8 SE_PPR: Product Patching and Remediation Attribute Definition A well-documented process exists for patching and remediating products. Priority is given to known severe vulnerabilities. O-TTPS Reference Section 4.1.2.4. Assessor Activity Tables SE_PPR.01 There shall be a well-documented process for patching and remediating products. Assessment Type Process and Implementation Related Requirements PD_CFM.03, PD_PSM.all Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Product Patching and Remediation Process Evidence of Conformance (Implementation) Problem reports, patching schedules, release roadmap, release notifications, change requests, etc. SE_PPR.03 Remediation of vulnerabilities shall be prioritized based on a variety of factors, including risk. Assessment Type Process and Implementation Related Requirements PD_PSM.all, SC_RSM.all, SC_VAR.01 Specific Guidelines for Assessor Activities As stated in the attribute definition, vulnerability assessment review should utilize the criteria for prioritization of the remediation of vulnerabilities that are defined by the Organization. Evidence of Conformance (Process) Vulnerability: Remediation Process Evidence of Conformance (Implementation) Implementation evidence as defined in the process documentation; for example, bug and defect reports, change management documentation for resolutions of vulnerability defects, vulnerability checklists, and vulnerability assessment review Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 25 B.9 SE_SEP: Secure Engineering Practices Attribute Definition Secure engineering practices are established to avoid the most common engineering errors that lead to exploitable product vulnerabilities. O-TTPS Reference Section 4.1.2.5. Assessor Activity Tables SE_SEP.01 Secure coding practices shall be utilized to avoid common coding errors that lead to exploitable product vulnerabilities. For example, user input validation, use of appropriate compiler flags, etc. Assessment Type Process and Implementation Related Requirements SE_TAM.all, SE_VAR.all Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Product Development Process Evidence of Conformance (Implementation) Acceptable coding patterns, results from tooling that enforces coding patterns, results from manual code reviews, minimize footprint SE_SEP.02 Secure hardware design practices (where applicable) shall be employed. For example, zeroing out memory and effective opacity. Assessment Type Process and Implementation Related Requirements SE_TAM.all, SE_VAR.all Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Product Design Process Evidence of Conformance (Implementation) Evidence that design practices are implemented such as: assets from secure deliverables, results from tooling that enforces secure design practices, results from manual review of the application of secure design practices SE_SEP.03 Training on secure engineering practices shall be provided to the appropriate personnel on a regular basis consistent with changing practices and the threat landscape. Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 26 Assessment Type Process and Implementation Related Requirements SE_SEP.all, SE_TAM.01, SE.MTL.02 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Training Process Evidence of Conformance (Implementation) Evidence that training has been provided such as training artifacts; for example, training certificates, Computer-Based Training (CBT), training attendance statistics Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 27 B.10 SE_MTL: Monitor and Assess the Impact of Changes in the Threat Landscape Attribute Definition The threat landscape is monitored and the potential impacts of changes in the threat landscape are assessed on development/engineering practices, tools, and techniques. O-TTPS Reference Section 4.1.2.6. Assessor Activity Tables SE_MTL.02 Changes to the development/engineering practices, tools, and techniques shall be assessed in light of changes to the threat landscape. Assessment Type Process and Implementation Related Requirements SE_TAM.01, PD_CFM.03 Specific Guidelines for Assessor Activities There may, or may not have been changes, but a process should exist to govern such change. Evidence of Conformance (Process) Process Improvement Process Evidence of Conformance (Implementation) Quality engineering/management review, changed secure engineering practices, the applicant's assessment of the development/engineering practices, tools, and techniques in light of changes to the threat landscapes SE_MTL.03 The cause of product vulnerabilities shall be evaluated and appropriate changes to the development/engineering practices, tools, and techniques identified to mitigate similar vulnerabilities in the future. Assessment Type Process and Implementation Related Requirements SE_VAR.01 Specific Guidelines for Assessor Activities There may, or may not have been changes, but a process should exist to govern such change. Evidence of Conformance (Process) Vulnerability: Root Cause Analysis Process, Process Improvement Process Evidence of Conformance (Implementation) Changed secure engineering practices, the applicant's assessment of the development/engineering practices, tools, and techniques in light of changes to the vulnerability analysis Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 28 B.11 SC_RSM: Risk Management Attribute Definition The management of supply chain risk around tainted and counterfeit components and products includes the identification, assessment, prioritization, and mitigation of business, technical, and operational risks. O-TTPS Reference Section 4.2.1.1. Assessor Activity Tables SC_RSM.02 Supply chain risk identification, assessment, prioritization, and mitigation shall be conducted. Assessment Type Process and Implementation Related Requirements PD_MPP.02 Specific Guidelines for Assessor Activities Supply chain risk identification, assessment, prioritization, and mitigation shall be conducted. Evidence of Conformance (Process) Risk Management Process Evidence of Conformance (Implementation) Supply chain risk/business continuity planning policy documents, playbooks reflecting how to handle supply chain disruption, post-incident summary documents SC_RSM.03 The output of risk identification, assessment, and prioritization shall be addressed by a mitigation plan, which shall be documented. Assessment Type Implementation Related Requirements PD_RSM.02 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Mitigation plan, output from the risk identification assessment SC_RSM.04 The output of risk identification, assessment, and prioritization shall be addressed by a mitigation plan, which shall be followed routinely. Assessment Type Implementation Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 29 Related Requirements SC_CTM.04 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Evidence that risk management plan has been followed, component qualification data/reports, snapshot of applicable risk management tools, change history on risk assessment plan, evidence supporting the frequency of updates/reviews matches that described in the risk management process SC_RSM.06 Supply chain risk management training shall be incorporated in a provider’s organizational training plan, which shall be reviewed periodically and updated as appropriate. Assessment Type Implementation Related Requirements SC_STR.01 Specific Guidelines for Assessor Activities The purpose of receiving the training artifacts evidence is to ensure that the training occurs, not to judge the effectiveness of the training. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Training plan, includes supply chain training (refer to note 3) Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 30 B.12 SC_PHS: Physical Security Attribute Definition Physical security procedures are necessary to protect development assets and artifacts, manufacturing processes, the plant floor, and the supply chain. O-TTPS Reference Section 4.2.1.2. Assessor Activity Tables SC_PHS.01 Risk-based procedures for physical security shall be established and documented. Assessment Type Process Related Requirements SC_RSM.all Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Risk Management Process: Physical Security Evidence of Conformance (Implementation) None. SC_PHS.02 Risk-based procedures for physical security shall be followed routinely. Assessment Type Implementation Related Requirements SC_STR.01 Specific Guidelines for Assessor Activities The evidence supplied should be related to the procedures; e.g., if the procedure says CCTV is a control, then appropriate CCTV video would be expected to be provided as Evidence of Conformance. Refer to General Requirements for Evidence of Conformance within this document. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Photographs of the relevant physical security controls; for example, cages, doors, loading bays, fences, rooftop, ceiling, cabling, etc., snapshots of audit reports, CCTV video, video of implementation of personnel ingress/egress searches, security logs Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 31 B.13 SC_ACC: Access Controls Attribute Definition Proper access controls are established for the protection of product-relevant intellectual property against the introduction of tainted and counterfeit components where applicable in the supply chain. O-TTPS Reference Section 4.2.1.3. Assessor Activity Tables SC_ACC.01 Access controls shall be established and managed for product-relevant intellectual property and assets and artifacts. Assets and artifacts include controlled elements related to the development/manufacturing of a provider’s product. Assessment Type Process and Implementation Related Requirements PD_MPP.02, SC_RSM(ALL), SC_ISS.01 Specific Guidelines for Assessor Activities The Assessor is not required to determine the effectiveness or appropriateness of access policy. Note that the following requirements are to be viewed as a whole; the intent is to show that access policies are in place and are being followed. Evidence of Conformance (Process) Security Controls: Access Control Policies & Procedures Evidence of Conformance (Implementation) System password and access policies, actual audit reflecting an individual’s use of access controls, actual audit reflecting badge-based physical access, transport tracking, inventory account reports SC_ACC.02 Access controls established and managed for product-relevant intellectual property and assets and artifacts shall be documented. Assessment Type Implementation Related Requirements None. Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Supplier premises logs, access control lists, access logs, NDA agreements SC_ACC.03 Access controls established and managed for product-relevant intellectual property and assets and artifacts shall be followed routinely. Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 32 Assessment Type Implementation Related Requirements SC_ISS.01 Specific Guidelines for Assessor Activities Refer to General Requirements for Evidence of Conformance within this document regarding “routinely”. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Photographs, CCTV video, video of implementation of personnel ingress/egress searches, access Logs, badges, time clock reports, split key reports SC_ACC.05 Access controls established and managed for product-relevant intellectual property and assets and artifacts shall employ the use of access control auditing. Assessment Type Implementation Related Requirements None. Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Security Controls: Access Control Audit Process Evidence of Conformance (Implementation) Audit reports or communications to management of audit results or internal SC security metric reports Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 33 B.14 SC_ESS: Employee and Supplier Security and Integrity Attribute Definition Background checks are conducted for employees and contractors whose activities are directly related to sensitive product supply chain activities. A Trusted Technology Provider has a set of applicable business conduct guidelines for their employee and supplier communities. A Trusted Technology Provider obtains periodic confirmation that suppliers are conducting business in a manner consistent with principles embodied in industry conduct codes, such as the Electronic Industry Citizenship Coalition (EICC) Code of Conduct. O-TTPS Reference Section 4.2.1.4. Assessor Activity Tables SC_ESS.01 Proof of identity shall be ascertained for all new employees and contractors engaged in the supply chain, except where prohibited by law. Assessment Type Process and Implementation Related Requirements None. Specific Guidelines for Assessor Activities Typically, this may be part of the hiring process, but needs to be explicitly part of that process. Assessors are checking identity not legality. Implementation evidence may be varied by country. Evidence of Conformance (Process) HR Identity Check Process Evidence of Conformance (Implementation) Evidence that the identity is verified by the Organization Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 34 B.15 SC_BPS: Business Partner Security Attribute Definition Business partners follow the recommended supply chain security best practice requirements specified by the O-TTPS. Periodic confirmation is requested that business partners are following the supply chain security best practices requirements specified by the O-TTPS. O-TTPS Reference Section 4.2.1.5. Assessor Activity Tables SC_BPS.01 Supply chain security best practices (e.g., O-TTPS) shall be recommended to relevant business partners. Assessment Type Implementation Related Requirements SC_CTM.01, SE_VAR.03, PD_PSM.02 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Communication reflecting recommended practices, security requirements for suppliers, supplier assessment records reflecting security aspects, list of relevant business partners and best practices Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 35 B.16 SC_STR: Supply Chain Security Training Attribute Definition Personnel responsible for the security of supply chain aspects are properly trained. O-TTPS Reference Section 4.2.1.6. Assessor Activity Tables SC_STR.01 Training in supply chain security procedures shall be given to all appropriate personnel. Assessment Type Implementation Related Requirements SC_ACC.03, SC_PHS.02, SC_RSM.06 Specific Guidelines for Assessor Activities The Assessor does not need to determine what “appropriate” means; this is defined by the Organization. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Training materials, minutes or materials from informational, training artifacts, training attendance statistics, training certificates, computer-based training, a list of appropriate personnel Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 36 B.17 SC_ISS: Information Systems Security Attribute Definition Supply Chain information systems properly protect data through an appropriate set of security controls. O-TTPS Reference Section 4.2.1.7. Assessor Activity Tables SC_ISS.01 Supply chain data shall be protected through an appropriate set of security controls. Assessment Type Implementation Related Requirements SC_ACC.all Specific Guidelines for Assessor Activities Supply chain data may include electronic transactions, orders, routing and transit information, and specifications. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) List of the types of supply chain data that are protected, list of associated security controls Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 37 B.18 SC_TTC: Trusted Technology Components Attribute Definition Supplied components are evaluated to assure that they meet component specification requirements. Suppliers follow supply chain security best practices with regard to supplied components (e.g., O-TTPS). O-TTPS Reference Section 4.2.1.8. Assessor Activity Tables SC_TTC.01 The quality of supplied components shall be assessed against the component specification requirements. Assessment Type Process and Implementation Related Requirements SC_RSM.02, PD_QAT.all Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Quality Assurance Process Evidence of Conformance (Implementation) Component specifications, component quality conformance reports, identification of high-risk components SC_TTC.02 Counterfeit components shall not knowingly be incorporated into products. Assessment Type Process Related Requirements PD_MPP.02, SC_RSM.all, SC_CTM.all Specific Guidelines for Assessor Activities Note that it is not possible to assess whether the policy has been implemented. Evidence of Conformance (Process) Policy on Use of Counterfeit Components Evidence of Conformance (Implementation) None. Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 38 B.19 SC_STH: Secure Transmission and Handling Attribute Definition Secure transmission and handling of assets and artifacts during delivery is needed to lower the risk of product tampering while in transit to their destination. O-TTPS Reference Section 4.2.1.9. Assessor Activity Tables SC_STH.01 Secure transmission and handling controls shall be established and documented. Assessment Type Process and Implementation Related Requirements SC_ISS.01 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Risk Management Process, Security Controls: Secure Transmission and Handling Evidence of Conformance (Implementation) Photos reflecting CCTV use in manufacturing operations and product transfer locations, review of a portion of CCTV video to validate operation of CCTV SC_STH.02 Secure transmission and handling controls shall be designed to lower the risk of physical tampering with assets and artifacts that are physically transported. Assessment Type Process and Implementation Related Requirements None. Specific Guidelines for Assessor Activities Note that the Assessor is not required to determine the effectiveness of the controls themselves. Evidence of Conformance (Process) Risk Management Process, Security Controls: Secure Transmission and Handling Evidence of Conformance (Implementation) Packaging, security tape, shipping logs, badges, and guards bonded transport, photographic evidence, interviews with security staff SC_STH.03 Secure transmission and handling controls shall be designed to lower the risk of tampering with assets and artifacts that are electronically transmitted. Assessment Type Process and Implementation Related Requirements None. Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 39 Specific Guidelines for Assessor Activities The Assessor is not required to determine the effectiveness of the controls themselves. Evidence of Conformance (Process) Risk Management Process, Electronic Delivery Process, Security Controls: Secure Transmission and Handling Evidence of Conformance (Implementation) Demonstrated use of encryption, SFTP servers, access controls SC_STH.04 Secure transmission and handling controls shall be followed routinely. Assessment Type Implementation Related Requirements SC_STR.01 Specific Guidelines for Assessor Activities Refer to item 3 of Section A.1 of this document. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Demonstrated use of encryption, SFTP servers, access controls Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 40 B.20 SC_OSH: Open Source Handling Attribute Definition Open Source components are managed as defined by the best practices within the O-TTPS for Product Development/ Engineering methods and Secure Development/Engineering methods. O-TTPS Reference Section 4.2.1.10. Assessor Activity Tables SC_OSH.02 In the management of Open Source assets and artifacts, components sourced shall be identified as derived from well-understood component lineage. Assessment Type Process and Implementation Related Requirements PD-CFM.02, PD_CFM.03, PD_DES.02 Specific Guidelines for Assessor Activities Verify that a sample Open Source component's lineage is tracked and identified in the software development lifecycle tools. Evidence of Conformance (Process) Product Development Process Evidence of Conformance (Implementation) Records of component lineage derivation for the open sourced components SC_OSH.03 In the management of Open Source assets and artifacts, components sourced shall be subject to well-defined acceptance procedures that include asset and artifact security and integrity before their use within a product. Assessment Type Process and Implementation Related Requirements PD_CFM.06, PD_QAT.01, SC_MAL.all Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Product Test Process Evidence of Conformance (Implementation) Security and integrity checking might include activities such as checking hash values of included open source code, vulnerability analysis, and performing malware checks SC_OSH.04 For such sourced components, responsibilities for ongoing support and patching shall be clearly understood. Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 41 Assessment Type Process and Implementation Related Requirements PD_CFM.03, PD_PSM.all Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Product Support Policy Evidence of Conformance (Implementation) The Applicant’s point of contact for customers to request support and patching Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 42 B.21 SC_CTM: Counterfeit Mitigation Attribute Definition Practices are deployed to manufacture, deliver, and service products that do not contain counterfeit components. Practices are deployed to preclude the unauthorized use of scrap from the hardware manufacturing process. O-TTPS Reference Section 4.2.1.11. Assessor Activity Tables SC_CTM.01 Instances of counterfeit activity relating to products shall be reviewed and an appropriate response sent. Assessment Type Process and Implementation Related Requirements PD_MPP.02, SC_BPS.01, SE_VAR.03 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Counterfeit Review and Response Policy Evidence of Conformance (Implementation) Records showing the monitoring of grey market activities, copies of portions of investigation reports and action plans upon counterfeit findings, records of appropriate response sent SC_CTM.04 Techniques shall be utilized as applicable and appropriate to mitigate the risk of counterfeiting, such as security labeling and scrap management techniques. Assessment Type Process and Implementation Related Requirements SC_RSM.04. SC_PHS.all, SC_ACC.05 Specific Guidelines for Assessor Activities None. Evidence of Conformance (Process) Security Controls: Risk Management Process, Anti-counterfeit Controls Evidence of Conformance (Implementation) List of high-risk item that are subject to these controls, scrap handling procedures, demonstrations of use of labeling and photo of labeling, demonstration of results arising from use of anti-counterfeit technology, demonstration/observation/photos of their use, holograms, inks, RFID, etc. Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 43 B.22 SC_MAL: Malware Detection Attribute Definition Practices are employed that preclude as far as practical the inclusion of malware in components received from suppliers and components or products delivered to customers or integrators. O-TTPS Reference Section 4.2.1.12. Assessor Activity Tables SC_MAL.01 One or more up-to-date commercial malware detection tools shall be deployed as part of the code acceptance and development processes. Assessment Type Implementation Related Requirements SC_CFM.04, PD_QAT.01 Specific Guidelines for Assessor Activities The processes for this are described in the related requirements. The Assessor should ensure that the acceptance criteria include malware detection. Since some systems may be proprietary or otherwise may not have commercial malware detection tools, this is a non-conformity and the rationale for this must be included in the assessment report. Evidence of Conformance (Process) None. Evidence of Conformance (Implementation) Acceptance procedures requiring the use of malware detection tools, demonstration and/or copies of records showing application of malware detection tools to code in the development stage, up-to-date signatures being used in the detection tool SC_MAL.02 Malware detection techniques shall be used before final packaging and delivery (e.g., scanning finished products and components for malware using one or more up-to-date malware detection tools). Assessment Type Process and Implementation Related Requirements SC_CFM.04, PD_QAT.01, PD_QAT.03, PD_PSM.01 Specific Guidelines for Assessor Activities The processes for this may be described in the related requirements. The Assessor should ensure that the criteria for release include malware detection. Evidence of Conformance (Process) Quality Assurance Process Evidence of Conformance (Implementation) Release procedures requiring the use of malware detection tools, demonstration and/or copies of records showing application of malware detection tools before final packaging and delivery Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 44 C Recording Assessment Findings To help assure consistency across O-TTPS accreditation applications, the guidelines in this section should be followed. C.1 Recording Final Observations Below is an example of one requirement table from the Accreditation Package Document, which will initially be completed by the Organization with information on where the Assessor can find the applicable Evidence of Conformance for each item/row. The last column “Assessor Comment” is where the Assessor will record their Assessment findings for each item in the table. The Assessor may use this table to record and revise their findings throughout the Assessment process should they choose to, but they must record their final findings in the Assessor Comment Column in the final Accreditation Package Document before submitting it to the Accreditation Authority. During the Assessment, if the finding is that the evidence provided indicates conformance, the Assessor will indicate this by completing the mandatory Assessor Comment column. The minimum content of the Assessor Comment column for each requirement is: • Date conformance was established • Assessor or Assessor(s) responsible for the specific finding • Evidence assessed (which of the recommended types of evidence was examined, or if alternative evidence was considered why it was determined to be equivalent) • Assessment method employed (e.g., documentation audit, direct inspection, face-to-face interview, web conference, interview conference call, photograph inspection, video recording, online system audit) • Rationale for PASS PD_DES.01 A process shall exist that assures the requirements are addressed in the design. Required Types of Process Evidence Product Design Process, Product Requirements Management Process Recommended/Suggested Types of Implementation Evidence Design artifacts, requirements traceability report, quality assurance, audit reports Process ID Product No Evidence File Name Description of Evidence Pointer within Evidence Assessor Comment Process Evidence Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 45 Product Design Process Product Requirements Process [Add more rows if needed] Implementation Evidence for each Selected Representative Product P1 [Add more rows if needed] P… [Add more rows if needed] C.2 Determining the Assessment Outcome For each and every requirement, the Assessor must determine whether a PASS finding can be asserted and, if so, completes the Assessor Comment column to record the basis of that finding. C.3 Completing the Assessment Report The final step is to complete the Assessment Report, which is part of the Assessment Package Document – and is included here for illustration. The Assessor completes all of the fields, with the information described below and submits it to the Accreditation Authority. Table 1: Assessment Report Template Organization [As defined in the Conformance Statement.] Authorized Signatory of the Organization [Printed name and signature of Authorized Signatory. The Signature means that the Organization has reviewed the report and concurs with the findings.] Report Submission Date [The date the report is submitted to the Accreditation Authority.] Acceptance Date [The date the report is approved by the Accreditation Authority.] Assessment Organization Name and ID [Must be an O-TTPS Recognized Assessor (Company)] Assessment Team Leader Name and ID [Printed name and signature of Assessment Team Leader. This is the individual who will “sign-off” on the Assessment Report. Must have met the O-TTPS Assessor criteria, passed the O-TTPS Assessor Examination, and be employed or contracted by an O-TTPS Recognized Assessor (Company).] Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 46 Assessors who participated in the Assessment [Names of all of the Assessors who participated in the Assessment. Must have met the O-TTPS Assessor criteria, passed the O-TTPS Assessor Examination, and be employed or contracted by an O-TTPS Recognized Assessor (Company).] O-TTPS Accreditation Requirements Version [O-TTPS Accreditation Requirements version number.] Assessment Team Recommendation Designated Accreditation Authority Individual [Approving report] Approved Assessment Outcome Open Trusted Technology Provider™ Standard (O-TTPS): Assessment Procedures 47
© Copyright 2026 Paperzz